Overview
overview
7Static
static
363e7c88b7d...18.exe
windows7-x64
363e7c88b7d...18.exe
windows10-2004-x64
3$APPDATA/L...ll.exe
windows7-x64
7$APPDATA/L...ll.exe
windows10-2004-x64
7$PLUGINSDI...ol.dll
windows7-x64
3$PLUGINSDI...ol.dll
windows10-2004-x64
3Excalibur.exe
windows7-x64
1Excalibur.exe
windows10-2004-x64
1ExcaliburGlossary.pdf
windows7-x64
1ExcaliburGlossary.pdf
windows10-2004-x64
1ExcaliburHelp.chm
windows7-x64
1ExcaliburHelp.chm
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:08
Behavioral task
behavioral1
Sample
63e7c88b7d73aebd3eae532e134e213b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63e7c88b7d73aebd3eae532e134e213b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$APPDATA/Lighttwist Software/Excalibur/uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$APPDATA/Lighttwist Software/Excalibur/uninstall.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Excalibur.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Excalibur.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
ExcaliburGlossary.pdf
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
ExcaliburGlossary.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
ExcaliburHelp.chm
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
ExcaliburHelp.chm
Resource
win10v2004-20240426-en
General
-
Target
$PLUGINSDIR/AccessControl.dll
-
Size
13KB
-
MD5
9e7d36edcc188e166dee9552017ac94f
-
SHA1
0378843fe1e7fb2ad97b8432fbdcb44faa6fc48a
-
SHA256
d52a83c2a8551cebf48ff7a8d5930be1873bce990f855ccab4d7479cfeb22e3d
-
SHA512
92c31355cd124ba28c0ff9aa8fa34d5db9db0b093edb8978bc3cf94e1f72d526603d5d5c1e221dcb2ac6648bc420f4df9847c2b1e71046384d827814a77d1783
-
SSDEEP
192:y26NwF1FF8GqdxASZlSOnNGGPCqLXUdadWo2FfTCWWqDsYjGI5hBslft8gWNPjQo:I+8vwSZlgaJ3/4/4Q/bN
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3416 1048 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1496 wrote to memory of 1048 1496 rundll32.exe rundll32.exe PID 1496 wrote to memory of 1048 1496 rundll32.exe rundll32.exe PID 1496 wrote to memory of 1048 1496 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\AccessControl.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\AccessControl.dll,#12⤵PID:1048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 6163⤵
- Program crash
PID:3416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1048 -ip 10481⤵PID:4588